Limin Yang
Limin Yang
CS Ph.D. Student, UIUC
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
292018
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics
M Xue, L Yang, KW Ross, H Qian
Peer-to-peer networking and applications 10 (2), 357-367, 2017
172017
Opening the blackbox of virustotal: Analyzing online phishing scan engines
P Peng, L Yang, L Song, G Wang
Proceedings of the Internet Measurement Conference, 478-485, 2019
162019
Measuring and modeling the label dynamics of online anti-malware engines
S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song, G Wang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2361-2378, 2020
102020
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes
L Yang, X Li, Y Yu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
32017
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies
H Hu, L Yang, S Lin, G Wang
arXiv preprint arXiv:2001.04520, 2020
22020
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
12020
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
2021
Benchmarking Label Dynamics of VirusTotal Engines
S Zhu, Z Zhang, L Yang, L Song, G Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–9